{"version":"1.0","type":"rich","provider_name":"Acast","provider_url":"https://acast.com","height":250,"width":700,"html":"<iframe src=\"https://embed.acast.com/$/5d8bcecff9db944d2395157f/6470d16913f6aa0011220ffa?\" frameBorder=\"0\" width=\"700\" height=\"250\"></iframe>","title":"Episode 225: China Attempts Guam Tip-Over","thumbnail_width":200,"thumbnail_height":200,"thumbnail_url":"https://open-images.acast.com/shows/5d8bcecff9db944d2395157f/1571355871542-37e0e45644315ab62355baf355541aab.jpeg?height=200","description":"<p>Today, Les, Jess, and Jamil discuss this week’s announcement by Microsoft and the U.S. government that they detected a Chinese cyber hack by hacking group, Volt Typhoon, directed at critical infrastructure systems, including telecommunications gear, located in Guam and elsewhere in the United States.&nbsp;</p><p><br></p><p>Is China hacking Guam a prelude to a Taiwan invasion? Should the U.S. ramp up its response against China? Is the U.S. prepared to deter enemy action in the cyber domain?&nbsp;</p><p><br></p><p>Hear our experts debate these issues and more in less than 10 minutes on our latest episode of Fault Lines!</p><p><br></p><p>Want to learn more about this topic? Check out these articles that our experts used to frame our discussion:</p><p><br></p><p><a href=\"https://www.nytimes.com/2023/05/24/us/politics/china-guam-malware-cyber-microsoft.html\" rel=\"noopener noreferrer\" target=\"_blank\">https://www.nytimes.com/2023/05/24/us/politics/china-guam-malware-cyber-microsoft.html</a>&nbsp;</p><p><br></p><p><a href=\"https://www.washingtonpost.com/technology/2023/05/24/china-hack-guam-taiwan/\" rel=\"noopener noreferrer\" target=\"_blank\">https://www.washingtonpost.com/technology/2023/05/24/china-hack-guam-taiwan/</a>&nbsp;</p><p><br></p><p><br></p><p>Follow our experts on Twitter:</p><p><br></p><p>@lestermunson</p><p><br></p><p>@NotTVJessJones</p><p><br></p><p>@jamil_n_jaffer</p><p><br></p><p><br></p><p>Like what we're doing here?&nbsp;</p><p><br></p><p>Be sure to rate, review, and subscribe.</p><p><br></p><p>And don’t forget to follow @masonnatsec on Twitter!</p>","author_name":"National Security Institute"}